Analysis

  • max time kernel
    138s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 20:30

General

  • Target

    comparendo24755693025simitverenlineacgbindata.exe

  • Size

    781KB

  • MD5

    4848c2aa032ded794410ebc729fc18a2

  • SHA1

    ba4200a24bbd4f70594e72414493a350b4c95608

  • SHA256

    63bd1085581bf0a8f7c9b01eb5d3a2d551fcc671a3916064891ea85c00d24669

  • SHA512

    05e9bded510f16f06364ae913f1f494434b1cff4723213dbda1ebdf8da21ffa42764252e129d9e74fe501b5b273884b07213edf81efe24ec14692752f78b714b

  • SSDEEP

    12288:2rD64vvpqDUB/B1idOmEigAqiiqwTFTBK/cOV682wiVZe+0Ks:8DxvuUB7idOmEHNqsxBHOR2rVZAKs

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 9 IoCs
  • Modifies security service 2 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • System policy modification 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\comparendo24755693025simitverenlineacgbindata.exe
    "C:\Users\Admin\AppData\Local\Temp\comparendo24755693025simitverenlineacgbindata.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\AppData\Local\Temp\comparendo24755693025simitverenlineacgbindata.exe
      "C:\Users\Admin\AppData\Local\Temp\comparendo24755693025simitverenlineacgbindata.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Modifies security service
      • UAC bypass
      • Windows security bypass
      • Windows security modification
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:908
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "\Microsoft\Windows\System\Dev34\Files\iTelemetryLogtte" /SC MINUTE /MO 3 /RL HIGHEST /tr "C:\Users\Admin\AppData\Local\Temp\comparendo24755693025simitverenlineacgbindata.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1860
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /delete /tn "iTelemetryLogtte" /f
        3⤵
          PID:1424
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1412
        • C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe
          "C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe
            "C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe"
            4⤵
            • Executes dropped EXE
            PID:4044
          • C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe
            "C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe"
            4⤵
            • Modifies Windows Defender Real-time Protection settings
            • Modifies security service
            • UAC bypass
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:4200
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "\Microsoft\Windows\System\Dev34\Files\iTelemetryLogtte" /SC MINUTE /MO 3 /RL HIGHEST /tr "C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe" /f
              5⤵
              • Creates scheduled task(s)
              PID:2112
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /delete /tn "iTelemetryLogtte" /f
              5⤵
                PID:4408
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell" Get-MpPreference -verbose
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\comparendo24755693025simitverenlineacgbindata.exe.log

        Filesize

        1KB

        MD5

        27b2fec2a6283b09ef15bd709cb96c3d

        SHA1

        728585dd6390edf7806524dcf4bf18139632a001

        SHA256

        451a266b23424f3075e68b990cb90c7c177d48a64688c39ee77a4e9e239cf311

        SHA512

        bb10e90a881b259b1b90e54a1451f660c96e900576000a294cd1311ac5a6d3b3567cc7ad169ed26ff38719d65462ad31b2247e0f80118dd693f45927255de50b

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        968cb9309758126772781b83adb8a28f

        SHA1

        8da30e71accf186b2ba11da1797cf67f8f78b47c

        SHA256

        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

        SHA512

        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        18KB

        MD5

        5f1d5424e27e1101b3cd7cd91fe8a233

        SHA1

        e821ffa5b914f7796cbfa123fcbd35b5a5a8f8b7

        SHA256

        2a3d908593168e095fd3586b1de75cb442ab66286bafcfc1b994bdeccf95aa24

        SHA512

        fd6f3e352e16b629ad555cd360bc1af64749a8a2eeca1e539ed03b6c09aaa18ecc1fb88012c062170d3b7e5ebcba59e41c959efb4d5168bec209c09a096fc0b9

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hygupmzz.e5g.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe

        Filesize

        781KB

        MD5

        4848c2aa032ded794410ebc729fc18a2

        SHA1

        ba4200a24bbd4f70594e72414493a350b4c95608

        SHA256

        63bd1085581bf0a8f7c9b01eb5d3a2d551fcc671a3916064891ea85c00d24669

        SHA512

        05e9bded510f16f06364ae913f1f494434b1cff4723213dbda1ebdf8da21ffa42764252e129d9e74fe501b5b273884b07213edf81efe24ec14692752f78b714b

      • C:\Users\Admin\AppData\Roaming\Gret\Vepre.exe

        Filesize

        179KB

        MD5

        f8cbb6ba48c479fc935d0c3cf230de53

        SHA1

        038816489d42a07081fa0e2d8682c48b3573b96a

        SHA256

        84a437dcbc861a7e14ee0e9bdc4bde620a7544b8b1126f3573da11e112274e48

        SHA512

        71895239add1a67813bb55dd2bd191f4f2690fb27625d42767d3aa0929544cb6204ded669620f086aab885f54176f43d501f2c4809c5b435c4c6c5b888ae62de

      • memory/908-75-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/908-22-0x0000000006D60000-0x0000000006D9C000-memory.dmp

        Filesize

        240KB

      • memory/908-21-0x0000000006D00000-0x0000000006D12000-memory.dmp

        Filesize

        72KB

      • memory/908-20-0x00000000069F0000-0x0000000006A56000-memory.dmp

        Filesize

        408KB

      • memory/908-18-0x0000000005900000-0x0000000005910000-memory.dmp

        Filesize

        64KB

      • memory/908-16-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/908-13-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/1412-56-0x0000000006470000-0x000000000648E000-memory.dmp

        Filesize

        120KB

      • memory/1412-62-0x00000000073F0000-0x0000000007401000-memory.dmp

        Filesize

        68KB

      • memory/1412-69-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/1412-66-0x0000000007510000-0x0000000007518000-memory.dmp

        Filesize

        32KB

      • memory/1412-65-0x0000000007530000-0x000000000754A000-memory.dmp

        Filesize

        104KB

      • memory/1412-64-0x0000000007430000-0x0000000007444000-memory.dmp

        Filesize

        80KB

      • memory/1412-63-0x0000000007420000-0x000000000742E000-memory.dmp

        Filesize

        56KB

      • memory/1412-61-0x0000000007470000-0x0000000007506000-memory.dmp

        Filesize

        600KB

      • memory/1412-24-0x00000000025D0000-0x0000000002606000-memory.dmp

        Filesize

        216KB

      • memory/1412-26-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/1412-27-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/1412-25-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/1412-28-0x0000000005040000-0x0000000005668000-memory.dmp

        Filesize

        6.2MB

      • memory/1412-29-0x0000000004F10000-0x0000000004F32000-memory.dmp

        Filesize

        136KB

      • memory/1412-30-0x00000000056E0000-0x0000000005746000-memory.dmp

        Filesize

        408KB

      • memory/1412-60-0x0000000007260000-0x000000000726A000-memory.dmp

        Filesize

        40KB

      • memory/1412-40-0x0000000005880000-0x0000000005BD4000-memory.dmp

        Filesize

        3.3MB

      • memory/1412-41-0x0000000005EE0000-0x0000000005EFE000-memory.dmp

        Filesize

        120KB

      • memory/1412-42-0x0000000005F30000-0x0000000005F7C000-memory.dmp

        Filesize

        304KB

      • memory/1412-43-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/1412-44-0x000000007F580000-0x000000007F590000-memory.dmp

        Filesize

        64KB

      • memory/1412-59-0x00000000065B0000-0x00000000065CA000-memory.dmp

        Filesize

        104KB

      • memory/1412-46-0x0000000070690000-0x00000000706DC000-memory.dmp

        Filesize

        304KB

      • memory/1412-45-0x00000000064B0000-0x00000000064E2000-memory.dmp

        Filesize

        200KB

      • memory/1412-57-0x0000000007180000-0x0000000007223000-memory.dmp

        Filesize

        652KB

      • memory/1412-58-0x00000000078B0000-0x0000000007F2A000-memory.dmp

        Filesize

        6.5MB

      • memory/2764-3-0x0000000004D80000-0x0000000004E12000-memory.dmp

        Filesize

        584KB

      • memory/2764-6-0x0000000004FB0000-0x0000000004FCA000-memory.dmp

        Filesize

        104KB

      • memory/2764-7-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/2764-12-0x0000000009080000-0x000000000911C000-memory.dmp

        Filesize

        624KB

      • memory/2764-8-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/2764-9-0x0000000004FD0000-0x0000000004FDA000-memory.dmp

        Filesize

        40KB

      • memory/2764-10-0x0000000004FE0000-0x0000000004FEC000-memory.dmp

        Filesize

        48KB

      • memory/2764-17-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/2764-11-0x0000000006990000-0x0000000006A26000-memory.dmp

        Filesize

        600KB

      • memory/2764-5-0x0000000004D10000-0x0000000004D1A000-memory.dmp

        Filesize

        40KB

      • memory/2764-1-0x00000000002A0000-0x000000000036A000-memory.dmp

        Filesize

        808KB

      • memory/2764-4-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/2764-2-0x0000000005290000-0x0000000005834000-memory.dmp

        Filesize

        5.6MB

      • memory/2764-0-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/3020-85-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/3020-77-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/3020-78-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3020-76-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/3620-102-0x0000000006D30000-0x0000000006D7C000-memory.dmp

        Filesize

        304KB

      • memory/3620-116-0x0000000007D80000-0x0000000007D94000-memory.dmp

        Filesize

        80KB

      • memory/3620-90-0x0000000002F30000-0x0000000002F40000-memory.dmp

        Filesize

        64KB

      • memory/3620-91-0x0000000006190000-0x00000000064E4000-memory.dmp

        Filesize

        3.3MB

      • memory/3620-118-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/3620-89-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/3620-103-0x0000000002F30000-0x0000000002F40000-memory.dmp

        Filesize

        64KB

      • memory/3620-104-0x00000000706C0000-0x000000007070C000-memory.dmp

        Filesize

        304KB

      • memory/3620-114-0x0000000007A90000-0x0000000007B33000-memory.dmp

        Filesize

        652KB

      • memory/3620-115-0x0000000007D50000-0x0000000007D61000-memory.dmp

        Filesize

        68KB

      • memory/4200-84-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/4200-86-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4200-120-0x00000000752A0000-0x0000000075A50000-memory.dmp

        Filesize

        7.7MB

      • memory/4200-121-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB